CheckPoint 2015 SecurityReport English
CheckPoint 2015 SecurityReport English
SECURITY
REPORT
CHECK POINT
2015 SECURITY REPORT
REFERENCES 60
25 YEARS AGO 20 YEARS AGO 15 YEARS AGO 10 YEARS AGO 5 YEARS AGO NOW
Invention of Invention of Prevalent Use URL Filtering, NGFW Threat Intelligence,
Firewall Stateful of Anti-Virus, UTM Threat Prevention,
Inspection VPN, IPS Mobile Security
>
1988 1994 1998 2003 2006 2010 2014 2020
Morris Worm Green Card Lottery Melissa Anonymous WikiLeaks DDoS Bitcoin IoT Everywhere
Formed Attacks:
Stuxnet
SCADA
In science, it’s all about discovery—studying cause other mobile devices might not be tools, per se, but
and effect. Once something is understood and can be they can be hijacked to give hackers the ability to
predicted, it then becomes a process of engineering, penetrate corporate networks.
to replicate. In the world of cyber threats, it’s the
same. Cyber criminals are studying structures During 2014, Check Point saw significant
and thinking through how certain factors can spur exploits of vulnerabilities in open source software,
desired outcomes. Once they have a predictive as well as in common applications by Adobe
model, they set about engineering how to unleash and Microsoft.
what they’ve designed, for the greatest effect.
Known malware remained steady, continuing to
What are their tools? be pervasive and inflicting damage. But with the
1. Malware—malicious software code that hackers creation of signatures to help identify, filter, and
develop to either create disruption or to steal block subsequent deployment attempts of known
data. When malware becomes known, signatures malware, the focus among hackers changed. They
are created to help identify, filter, and block it in looked to something easier and more rewarding:
subsequent deployment attempts. And that’s when launching new attacks with unknown malware by
they turn to tampering with the code to create fresh slightly modifying what already existed—enabling
unknown malware. it to evade detection. It’s this area—unknown
2. Vulnerabilities—defects in software or operating malware—that exploded and caught most people’s
systems that hackers seek to exploit, which exist in attention during 2014. Launching at unprecedented
almost all applications. rates, new malware seemed to have a singular
3. Mobile Devices—smartphones, Fitbits, iPads, and purpose: stealing data.
EVERY 24 SECONDS
a host accesses a malicious website
EVERY 34 SECONDS
an unknown malware is downloaded
EVERY 1 MINUTE
a bot communicates with its
command and control center
EVERY 5 MINUTES
a high-risk application is used
EVERY 6 MINUTES
a known malware is downloaded
EVERY 36 MINUTES
sensitive data are sent
outside the organization
Contributing to the problem: cultural shifts. Between the frequency of the breaches and
Mobility, virtualization and other new technologies the high profiles of the businesses targeted,
have changed the way we work. And in the 2014 sent all organizations a clear message:
process, businesses have rushed to adopt Everyone is at risk.
these tools to boost productivity and efficiency.
But they’ve done so without considering the And when world leaders choose to focus on
security implications. While they are quite focused cyber security as they address their nations,
on stability and uptime, they don’t realize that it seems clear that cybercrime has reached a
better-secured environments have higher uptimes. critical point.
METHODOLOGY
During 2014, Check Point collected event data from ThreatCloud®, which is connected to security
three different sources around the world to shine a gateways of more than 16,000 organizations.
light on security trends, and identify issues that are 3. From more than 3,000 gateways connected to
on the rise or, in some cases, in decline. our ThreatCloud Emulation Services.
46
17
15
12
4 3 2
In the following pages, Check Point reveals the security and business leaders understand the
findings of our in-depth analysis of security threats threat landscape and how to create the strongest
and trends uncovered in 2014. Our aim is to help security posture possible.
Unknown malware is malware typically not organizations downloaded at least one infected
recognized or known by anti-virus systems. Each file with unknown malware—almost a 25 percent
new unknown malware variant, even if it only increase from the previous year.
has minor alterations, is potentially capable of
bypassing the most current anti-virus and virtual Worse is the speed at which this is occurring.
sandbox protections. Check Point’s research showed that on a daily
basis, 106 unknown malware downloads were
While we saw an explosion of unknown malware occurring per hour. That staggering figure is 48
last year, it was merely the tip of the iceberg, times bigger than last year’s mere 2.2 downloads
when viewed through today’s lens. Now, the rate of per hour.
zero-day and unknown malware is massive. From
2013 to 2014, new malware jumped just over 71 Incredibly, only one percent of enterprises use
percent from 83M to 142M, according to AV-Test, technologies to prevent zero-day attacks. And,
an independent service provider of anti-virus only one tenth of enterprises consume threat
research. And, more malware was found in the past intelligence services. Looking at the volume of
two years than in the previous 10 years combined. unknown malware that was downloaded, 52 percent
of infected files were PDFs, while 3 percent were
During 2014, Check Point analyzed more than Office files.
3,000 gateways and found that 41 percent of
83M 2013
34M 2012
142M
18.5M 2011
2010
18M
NEW MALWARE IN 2014 AND A
71% INCREASE VERSUS 2013
12M 2009
These previously unseen files tested the ability of Over the years this campaign has been active, it
security systems to detect unknown malware. has penetrated targets across the globe, allowing
hackers to monitor victims’ actions and steal
From there, suspect files were downloaded to sensitive information.
a host behind the security device, simulating
the accidental downloading of malware from a In selecting targets, it tends to choose primarily
malicious web page by an employee. defense contractors, telecommunications and media
companies, as well as educational institutions. We
In the case of the Unknown 300, if the file behaved as believe this is because these servers are publicly
expected, the data was allowed to enter the secure exposed, easily accessible gateways to private and
network. If it didn’t, threat emulation technology more secure internal networks. And, because they
created a signature for the type of file inspected and have a common business purpose, their security
ensured that file was blocked. It then communicated is often sacrificed for productivity, making them an
the signature to all security gateways, making the easy target for attackers.
unknown malware recognizable, or known.
The campaign is able to fly under the radar because it
Recently, Check Point discovered an attack campaign limits its actions to achieving specific goals in order to
that originated in 2012, but has since been mutating minimize the risk of exposure. A typical Volatile Cedar
into newer versions. Called Volatile Cedar, it uses a attack starts with a scan of the target’s server. Once
custom-made malware implant called “Explosive.” it identifies an exploitable vulnerability, it injects a
web shell code into the server. The web shell is then vulnerabilities of which vendors aren’t yet even
used as the means through which the Explosive aware. Compared with the cost of an unknown
Trojan is implanted into the victim server. Once inside, malware kit, hackers find that zero-day malware is
it lets the attackers send commands to all targets via much more expensive. This, alone, is probably why
an array of command and control (C&C) servers. The zero-day attacks tend to be selectively targeted.
command list contains all the functionality required
by the attacker to maintain control and extract One of the notable zero-day attacks of 2014 was
information from the servers, such as keylogging, called “Sandworm,” a reference to creatures from
clipboard logging, screenshots, and run commands. the science fiction series, “Dune.” In a targeted
attack on NATO, the Ukrainian government, and
Then, once the attacker gains control over these some other political targets, Russian hackers
servers, s/he can use them as a pivot point to explore, exploited the CVE-2014-4114 vulnerability—the
identify, and attack additional targets located deeper OLE package manager in Microsoft Windows and
inside the internal network. Windows Server. The vector: malicious PowerPoint
files sent as email attachments. When a user clicked
But even worse than unknown malware is zero-day on the attachment, an exploit was activated and
malware. What’s the difference? Unknown malware installed malicious code that opened a backdoor
builds off of known malware; zero-day malware is into the system. As a result, attackers could then
effectively built from scratch, to exploit software execute commands.
The first generation approach to improving malware ways to simulate an actual user opening the file.
catch rates was to run suspect files in a sandbox Next, you would watch to see if it triggered anything
outside the network; the point was to emulate a beyond what was normally expected. The problem:
standard operating system (OS) in a restricted Cybercriminals recognize these safeguards
environment for safe observation. Then, using exist on some percentage of networks and are
sandbox tools, you would activate files in various already implementing simple evasion techniques.
IPS, ANTI-VIRUS
& ANTI-BOT | CATCHES KNOWN OR OLD MALWARE
Of known malware, 71 in 1000 are not caught
For instance, the malware might remain dormant make CPU-level sandboxing the best technology
until specific conditions are met, such as opening on in detecting zero-day and unknown attacks.
a Tuesday, or when the user right clicks. This is why
it’s important to constantly focus on innovation and Taking that approach a step farther, when you
the latest in security technologies, to stay ahead of combine deep OS- and CPU-level sandbox
the hackers. capabilities with threat extraction, such as Check
Point’s Next Generation Zero-Day Protection, you
First-generation OS-level sandbox solutions help up the ante for threat elimination. At the OS level,
prevent some zero-day attacks and can detect you can detect attacks in both executable and data
malware once it is running. However, a lot of files alike. At the deep CPU level, you’re able to
malware can still avoid detection. For that reason, detect an infection in data files at the exploit phase.
a next-generation zero-day protection method is Threat extraction, the third prong of this powerful
needed: CPU-level sandboxing. combination, intercepts all documents, whether
malicious or not, and removes dynamic objects to
While there are countless vulnerabilities, there protect against any zero-day attack. Then, it flattens
are only a handful of exploitation methods that the file and delivers the document in an image-like
can be used to download the malware and execute format that is threat-free.
it. CPU-level sandboxing lets you detect the use of
exploitation methods by carefully examining CPU As evasion techniques evolve and get smarter, along
activity and the execution flow at the assembly with the types of attacks, so must the technology
code level while the exploit occurs. As a result, to keep your business secure. What has emerged
it preempts any possibility of hackers evading as cutting edge in 2014 will simply be the standard
detection. The speed and accuracy of detection for 2015.
Black Friday, which follows the United States’ Thanksgiving holiday, is one of the biggest shopping
days of the year. On the Monday just before the 2014 holiday, Check Point Incident Response Team
(CPIRT) was contacted by a retailer who had discovered unknown files on their systems. These files
were not detected by major anti-virus vendors. The bits of available intelligence on each individual
file may not have been enough to sound alarms, but the collective sum painted a much larger picture.
The files appeared to be part of a kit designed to deliver malicious payload laterally, through a network.
Still, details gleaned about other files in the kit were more ambiguous. Continuing with the
investigation, the response team sought to confirm some suspicions by running the files
through Check Point’s online ThreatCloud Emulation Services. Many of those files were flagged
as suspicious and showed downright malicious activity. One was particularly interesting to this
situation: The file was caught writing a text file in a Windows system directory.
Seeing the file write tracks.txt in the C:\Windows\System32\ directory upheld the belief that this
file was PoS malware, designed to harvest card track data. With that knowledge, it became evident
that this malware was part of a kit that could capture credentials; use them to install malware;
move around inside; and exfiltrate data out of the network. Had Threat Emulation been deployed,
this malware—and other components in the malicious kit—could have been blocked.
To address unknown malware and zero-day Key factors to consider in selecting a good
threats, you need to be able to identify them within sandbox include:
and beyond the operating system. The goal: to • Ability to block attacks, not just detect them
not only spot the threats, but also address • Ability to avoid evasions
evasion techniques. Check Point recommends • Fast and accurate detection
utilizing a three-pronged approach: a combination • Ability to decrypt SSL
of OS- and CPU-level sandbox capabilities with • Ability to support common file types
threat extraction. • Ability to support web objects such as Flash
26
22
PERCENT OF ORGANIZATIONS
17
14
8 8 8
7
6 6
5 5 5
4 4 4
3
2
K
S
CE
IA
EL
IA
EY
IA
EL
O
N
U
U
AD
N
U
IC
IC
U
U
N
SS
D
RK
RA
RA
AN
AI
LA
EX
EX
IN
IN
N
RU
KR
TU
IS
IS
FR
PO
CA
M
U
Given how easy and powerful unknown malware organizations downloaded a malicious file. Looking
is to create and launch, you would think we would at speed and frequency, hosts accessed a malicious
start seeing a decline in known malware. The reality, website every 24 seconds (compared to every minute
however, is that hackers continue to keep this in the previous year), and downloaded malware
method of attack in their arsenal. every six minutes (compared to every 10 minutes in
the previous year). When you consider how quickly
In 2014, Check Point researchers discovered that viruses can spread and wreak havoc, this goes way
roughly 86 percent of organizations accessed a beyond alarming.
malicious site. What’s more, close to 63 percent of
One of the more efficient ways to amplify and frequency represents a 66.7 percent jump from
accelerate the spread of malware is through bots— the previous year, and a 95 percent increase
when a computer has been infected with a Trojan or from 2012.
virus, it can allow third-party control over some or all
of the machine’s functions. A botnet is a network of When looking at bots, what kind of damage are
botted or zombie computers under the command of we talking about? Stealing banking credentials
an individual or organization that uses them to forward and other sensitive information; disabling system
spam email, attack other computers, or launch security services; installing malware; performing
DDoS attacks. click-fraud; gaining remote access; and opening a
backdoor for attacks comprised the majority of bot
Almost 83 percent of organizations had existing bot activity in 2014.
infections in 2014. And 47 percent of those were
active for more than four weeks—a disturbing One of the more notable bot infections took
length of time given that a bot communicates advantage of a vulnerability in Apple’s Mac
with its command and control (C&C) center computers in concert with the social, entertainment,
every minute. What’s more, that speed and and news site Reddit. A backdoor entry called
83%
of the organizations studied were infected
with bots. And, a bot communicates with its
C&C every minute
Tool automation and botnet distribution make credential harvesting through brute force easier every day.
For instance, prior to 2014, only one computer at a time could crack a password. This past year, however, a popular
password hash-cracking tool called Hashcat modified its source code to allow for distributed cracking—so
more than one computer could help to crack the password—making operations much faster for attackers.
So how does it work? Criminals capture large amounts of data from attacks. Sometimes it’s hashed or coded, and
not easy to use right away. That’s where the tools come in—they automate the cracking of the passwords and may
already be part of a botnet that allows for easier distribution. Once the hashes are cracked, brute force attacks try to
exploit password reuse; they also test to see if one person’s password works for someone else’s login. In fact, Check
Point has observed constant brute force attacks lasting weeks, where the attempts per second/minute/hour/day
are tuned by the attacker to evade detection. What’s more, this can lead to dumps on open text sharing sites like
Pastebin, where the information can then be sold.
To safeguard password storage, generate a cryptographic one-way hash of a password. In other words, if a
password is “bluesky,” a cryptograph will turn it into something like “fna84K.” This prevents keeping plain-text
passwords around and permits verification of user-supplied passwords by repeating the one-way hashing system.
Adding a randomly generated value to a password before creating their cryptographic hash can also increase the
difficulty of a password-cracking operation.
Since tools already exist to crawl the internet for hashes and passwords—and automate distributed password
cracking—fortifying the way you store this data is critical. To keep this information safe, take extra precautions
and use dual-factor verification, out-of-band user authentication, or even biometric authentication.
Remember, the fact that people reuse similar passwords means that every breach of thousands of
names creates the seeds for, potentially, hundreds of additional breaches.
In the past, if you wanted to contest a company’s from eight times per day in 2013. That represents
policies, you’d gather some people, make some a 500 percent increase! Last year, the majority of
signs, and stand outside their place of business for DDoS attacks was found largely in the consulting
a very public display of protest. Now? You just go sector. This year, it spans almost two thirds of
online and buy an inexpensive DDoS toolkit, enter businesses across all industries. After DDoS, the
the URL for the company you’re protesting, and next biggest attack vectors for the year were Buffer
you’re done—the company’s website is defaced. It’s Overflow, an attack that can corrupt data, and Code
easy, convenient, and cheap. Execution, which allows a hacker to inject arbitrary
code. Both increased significantly from the
In 2014, Distributed Denial of Service (DDoS) was previous year.
the top attack vector, accounting for 60 percent
48
of all attacks, almost double from the previous
year. DDoS attacks, which temporarily knock a DDoS attacks occurred
server or other network resource out of service, every day in 2014
were occurring 48 times per day in 2014—up
60
51
47
43
39
36
35
23 23 22
19
The past year saw an upswing in DDoS against educational facilities, service providers, US state
governments and city governments. Regardless of politics, the effects of hacktivism through DDoS
attacks are felt by innocent bystanders as much, if not more than, the intended targets. In countries
where the government provides the majority of connectivity for educational services, an attack on a
small school can impact every school in the network. A DDoS targeting one city’s website can cause
(and has caused) a loss of VPN connectivity with law enforcement field units and emergency
services—and not just during a major protest.
While the order of steps may vary, there are four main techniques used by hacktivists:
1. A multi-wave volumetric attack that uses millions of user datagram protocol (UDP) packets
on port 80. As a stateless protocol, UDP is very easy to fake, making the source appear as if it was
sent from a different internet protocol (IP) address. This floods the connection before organizations’
premise security devices can detect and react.
2. A domain name system (DNS) ‘reflection’ attack in which attackers send millions of DNS queries
to legitimate DNS servers, using a spoofed source IP address to appear as if they originated from a
server on the victim’s network. The legitimate DNS servers react by flooding DNS responses to
the victim, causing another wave of volumetric attacks.
3. A SYN flood attack targets a specific host. Spoofing the source address in high volume, it consumes
enough resources so that the host is unresponsive to legitimate traffic.
4. Slow attacks open as many connections as possible to a server and keep those connections open as
long as possible by sending bits of data right before the transmission control protocol (TCP) sessions
time out. The traffic is low, but the volume of slow connections congests inbound network ports.
Here’s what you can do to secure your organization:
1. Understand and monitor traffic volume such as connections per second, packets per second, and
throughput per second. If baseline thresholds are exceeded, tools like Check Point DDoS Protector TM
can be deployed in front of security gateways to mitigate DDoS traffic before reaching the gateway.
When volumetric attack traffic exceeds the internet circuit speed, it will saturate the network
connection before it reaches DDoS Protector or the security gateway, thereby denying service.
To prevent that from happening, DDoS Protector diverts traffic through DefensePipe to internet
scrubbing centers, where malicious traffic is removed and clean traffic is diverted back.
2. Implement tight controls on networks with guest access or unknown users’ bases such
as educational facilities, cloud providers, and service hosting companies.
3. Deploy source IP spoofing rules to prevent users on targeted networks from launching reflection
attacks. Dynamic, variant, and multi-wave styles of attacks can make it challenging to stop every
form of DDoS. But, Check Point’s Firewall Software Blade and IPS Software Blade have mitigation
tools and protections built into them—such as Rate Limiting, SYN Defender and IPS SYN Attack, and IPS
DNS—to help prevent DDoS attacks.
James Arbuthnot, former chairman of the UK Defense Select Committee, said it best: “Our national grid is
coming under cyberattack not just day by day, but minute by minute.”11 In fact, nearly 70 percent of critical
infrastructure (CI) companies suffered a security breach over the last year.12 One attack during 2014, by a
group of Russian hackers called Energetic Bear, launched a campaign that targeted oil and gas companies.
Through infection of industrial control software that those companies relied on, attackers embedded
malware that automatically downloaded and installed when the victim organizations updated their
software. This gave attackers visibility into—and potential control of—the targeted networks.
In a separate incident, a German steel mill was targeted, causing major damage to a blast furnace.
According to the German Federal office of Information Security, BSI, attackers deployed a socially
engineered spear phishing campaign to trick specific individuals into opening messages. From there,
the cybercriminals were able to capture login names and passwords, which helped them access the
mill’s production network. Once in, they went after the control systems, causing elements to fail, which
prevented the furnace from shutting down normally. As a result, the whole system was impaired.
1. Security Architecture: First and foremost, protect the corporate network to block infiltration of the
production network. Then, segment and protect your production network with specialized security. For
perimeter security, use proper tools such as firewall, intrusion prevention, anti-virus, anti-bot, and
threat emulation.
2. Security Products with Granular SCADA Support: Always use products specifically designed for SCADA
systems. Remember, CI industries rely on dedicated systems on specialized networks with unique protocols.
Solutions like Check Point SCADA security solutions include SCADA logging, firewall, app control, intrusion
prevention, and SCADA workstation endpoint security.
3. Threat Intelligence: Be sure to independently log all SCADA activity by using in-depth SCADA traffic
monitoring and analysis for threats.
7945 450
431
NUMBER OF VULNERABILITIES
376 368
5736 5632
5191 5297 287
4651
4155
156 155
138 135
120
11
LA
10
UX
E
14
M
13
LE
08
09
12
FT
AT
SC
PL
OB
L
20
IB
IL
20
20
20
20
20
20
DH
SO
AC
N
OG
CI
AP
OZ
AD
LI
RO
OR
GO
RE
M
IC
M
SECURITY EVENTS BY TOP SOFTWARE PROVIDERS
2014 2013 2012
77
PERCENT OF ORGANIZATIONS
67 68
14 15 15
13
10
6 6 5 5
3 3 4 4 4 3 3 2 2 1
T
AP E
HE
HP
LA
AN
OM
CA
LL
LL
AN
OF
OF
OF
OB
CL
OB
CL
PL
CL
OB
LL
UI
UI
E
E
OM
AC
OL
OL
3C
SQ
SQ
OV
OV
I
S
S
RA
RA
RA
AP
AD
AD
AD
OZ
RO
RO
RO
DE
DE
JO
N
/O
/O
/O
M
IC
IC
IC
VI
VI
N
N
M
M
SU
SU
SU
3.4 SOURCE: Common Vulnerabilities and Exposures (CVE) Database (top charts), Check Point Software Technologies (bottom chart)
FEELING VULNERABLE
One of the big issues that organizations need to vulnerabilities and exposures over the past three
address to help shore up their security is to patch years, we saw little increase between 2012 to 2013.
and update software. When this is overlooked, However, from 2013 to 2014, we saw a jump of just over
it creates a serious business vulnerability that can 53 percent.13 So while the good news is that awareness
needlessly interrupt performance—of man and is increasing around these potential exposures, the
machine. Looking at the total number of common bad news is that they still exist and are growing.
Hackers understand the most impactful way to strike targets is to attack their foundations. For most
operating systems, that foundation is a series of fundamental commands, often executed in Unix.
At the core of the command line shell used commonly in Apple MAC OS X and Linux/UNIX operating
systems is a command processor called Bash, or Bourne Again Shell.
In September 2014, a major security vulnerability was discovered in Bash that let attackers remotely
execute shell commands. It worked by attaching malicious code in environmental variables used by
the operating system.
From a hacker perspective, it does not get much better. Within days of the vulnerability announcement,
additional design flaws were also discovered and a series of patches were created. The race was on
to strike networks before the patches were inserted. Within hours, attackers exploited Shellshock
by creating botnets on compromised computers, to perform distributed denial-of-service attacks
and vulnerability scanning. While Check Point IPS-protected networks were patched the same day,
Shellshock compromised millions of unpatched servers and networks.
Check Point customers supported by IPS protection saw blocked attempts as the attacks prominently
targeted HTTP, Mail (SMTP/POP3/IMAP), FTP and DHCP protocols. Research findings showed
that the US was both the top target and the top attacker by a significant margin.
Community sharing isn’t always a good thing. Take has become an attractive target in order to steal data,
open-source software (OSS), for instance. Unlike intellectual property, and other sensitive information.
typical proprietary software that is closed, open- Thus, it becomes an open door to the network for
source software is written so that its source code is hackers to exploit.
freely available to the public and can be modified by
anyone. Worse, OSS is not managed as closely because For instance, OpenDaylight, a multi-vendor open-
it’s not always part of the IT procurement process. source software project, was forced to focus on
And, because it’s freeware, it’s not as closely security when a software-defined networking (SDN)
maintained as other software. Cybercriminals know flaw came to light. In August of 2014, a critical
this, so they redeploy attacks toward less-maintained, vulnerability was found in its platform, but it took
less-visible applications and systems. As a result, OSS about four months to get patched. The person
TOP IPS
EVENTS
40% In 2013, servers were the preferred target. Last year
this all changed: Clients are now the weakest link.
SERVER
ENTERPRISE ENDPOINT
VULNERABILITIES AND MISCONFIGURATIONS
54% 25%
Hosts that have at least Hosts that do not have
one Bluetooth device installed updated AV signatures
35% 10%
Hosts where user has Hosts that do not have
local admin permissions the latest service pack
While most businesses understand their responsibilities around compliance and meeting industry
regulations when it comes to security, it’s still a very complex issue. You could be fully compliant
one day, and then make a business-related change to your network and suddenly find yourself out
of compliance. Knowing what to watch for is critical. But don’t fall into the trap of thinking that just
because your organization is compliant it is completely secure. Meeting regulatory requirements
is typically tied to specific threats, making it less comprehensive than a security posture could and
should be. It should not be the basis of your security policy. Below is what Check Point discovered
in its 2014 research.
Anti-Spoofing not Anti-spoofing verifies that packets are PCI DSS 3.0 Global—any company
being activated coming from, and going to, the correct processing or storing
for 75% of the interfaces on the gateway. It confirms credit card data
respondents that packets claiming to be from an
internal network are actually coming NIST 800:41 Mainly relevant to US
from the internal network interface. Federal, but equally
It also verifies that, once a packet applicable to any US
is routed, it is going through the company adopting a
proper interface. robust firewall standard
Discovering Any Any The fundamental concept of the firewall PCI DSS 3.0 Global—any company
Accept rule in 27% rule base is “That which is not explicitly processing or storing
of respondents permitted is prohibited.” credit card data
To discover that 27% of respondents had NIST 800:41 Mainly relevant to US
an Any Any Accept rule in their rule base Federal, but equally
was a major surprise. This is firewall applicable to any US
101, the basic of basics. company adopting a
robust firewall standard
Out-of-State TCP TCP session timeout is the length of PCI DSS 3.0 Global—any company
packets not being time an idle connection will remain in processing or storing
dropped in 19% the security gateway connections table. credit card data
of respondents This idle session is the delay in which an
attacker can try to steal and use existing ISO 27001 Global—any company
user session package transportation. being certified to this
standard or adopting
Packets that are out of state should it as a best practice
be dropped. We found that 1 out of 5
companies are not dropping out of
state packets.
‘Those who do not learn from history are doomed to repeat it.’
This rings true in security, as well.
Keeping current with the issues and employing best security practices can keep businesses of all
sizes safe from the doom of replaying past mistakes. Below is a roundup of best practices that can
help you avoid some of the security pitfalls of large and small customers.
Inter-Department Compartmentalization
In large organizations, we often observe a common theme of information compartmentalization and,
sometimes, finger pointing between departments. In its most innocent form, some companies lack
internal information-sharing mechanisms or consistent IT policies; this results in one group having
a much more modern network than another. Unfortunately, many are not segmented internally so
a breach for one can result in a breach for all.
You would think that if something is known, it would • Cover the Critical. Extend your IPS protection to
be easier to keep in check. As you’ve read about make sure you’re able to defend against critical
known malware in this chapter, it’s clear that notion severity attacks. Cover your network server and IT
is misguided. infrastructure systems, regardless of the vendor
or platform.
Combatting known malware requires a multi- • Manage and Maintain. Keep on top of vulnerabilities
pronged approach. The core principle: Automate and with patching processes for all systems and
coordinate multiple layers of defense. applications.
• Detect and Defend. Be sure to utilize gateway and • Regulate and Restrict. When it comes to client
endpoint anti-virus software blades along with URL and server configuration, restrict the use of
filtering. This helps prevent connections with known administrator privileges; disable Java and other
distributors of malware. scripting; and regulate what applications can
• Block the Bot. Use an anti-bot software blade be installed on endpoints.
to spot malware and blunt botnet communications.
When mobility came along, so came the promise of security problems. As an attack vector, mobile
untethered productivity. But for many, mobile security devices provide easier direct access to valuable
was an afterthought. The goal for all should be to organizational assets than any other network
identify solutions that enable productivity, regardless intrusion point, making them the weakest link in
of whether you’re on or off premises. And this the security chain.
becomes especially important as we see a rise in the
usage of smartphones and tablets—along with their In a Check Point-sponsored global survey of more
associated apps—to make our lives easier. Because than 700 businesses, 42 percent of the survey
with that rise has come a desire to do business with sample had suffered mobile security incidents
those same devices, putting corporate data at risk. costing more than $250,000 to remediate—and 82
percent expected incidents to rise during 2015.
Predictably, the rising trend of Bring Your Own
Device (BYOD) has spawned a host of mobile
PRIVILEGED
| COMMUNICATION | CALLS
When mobile security is weak, it can provide magnified. In fact, 87 percent of IT professionals
attackers with personal information, passwords, say careless employees are a greater threat to
business and personal email, corporate documents, security than cybercriminals. And, 92 percent say
and access to company networks and applications. employee behaviors could have made a difference
In the business setting, that concern becomes in preventing high-profile security breaches.
OUT OF CONTROL
Among those surveyed, 91 percent have seen an So it’s no surprise that the top two BYOD security
increase in the number of personal mobile devices challenges faced by IT are securing corporate
connecting to corporate networks during the past information—reported by 72 percent of our sample;
two years. Alarmingly, 44 percent of organizations and managing personal devices that contain both
do not manage corporate data on employee-owned corporate and personal data and applications—
devices. Add to that, 33 percent of app developers cited by 67 percent of our respondents.
do not test their apps for security. 21
SECURING CORPORATE
INFORMATION 72
Survey Sample
More than 500k Android and 400K iOS devices from more than 100 countries.
Infections
Approximately 1,000 devices infected: 60% Android, 40% iOS.
Malware
More than 20 variants and 18 different mRAT product families found.
Risk
Corporate data in the form of emails, messages, keystrokes, calls,
employee location.
Attackers can target an enterprise and extract and attacking multiple targets inside them—
sensitive information from its employees’ mobile versus attacking corporate employees of random
devices. Malicious mRATs can allow potential organizations and targeting them without relation
attackers to steal sensitive information from to their organization.
a device. They can take control of the different
sensors to execute keylogging, steal messages, In the earlier survey referenced, when asked which
turn on video cameras, and more. mobile device platform posed the most problems,
64 percent of IT professionals cited Android
Interestingly, researchers discovered that as the riskiest. Apple iOS and Windows Mobile
employees of corporations are targeted by followed, both at 16 percent. Only four percent
mRATs. More specifically, the study showed that cited BlackBerry.
attackers were choosing certain organizations
Others
TalkLog
MobiStealth
My Mobile Watchdog
Shadow Copy Mspy
Mobile Spy
Bosspy
Spy2Mobile
The beauty of inter-process communication (IPC) is that it lets disparate specialized processes
cross function within an operating system. Within Android, the message-passing mechanism
of that system is Binder. In October 2014, Check Point’s research team exposed a fundamental
flaw associated with that system in a report entitled, “Man in the Binder: He Who Controls the
IPC, Controls the Droid.” In essence, our research team found it is possible to capture data
communicated over the Binder protocol and intercept sensitive details.
Learn more about Man in the Binder and other research findings from Check Point at
checkpoint.com/threatcloud-central.
With Android’s risk factor so much higher than the need to consider the security implications of
others, it’s no surprise that hackers are having a wearable tech and companion devices like Fitbit,
field day with it. One recently discovered malware Google Glass, smartwatches and others that
tricks Android users into believing they’ve powered connect to tablets and smartphones. As the Internet
down their devices, when in actuality, they haven’t. of Things (IoT) becomes commonplace in many
The malware reportedly allows remote users to homes and workplaces, the interconnectedness
make calls, send and receive messages, and take of technologies will make it possible to read
photos. 22
Ultimately, this can enable a simpler everything going from one device to the other.
path to stealing identities, as well as data. This is why we need to get a grasp on mobile
security now.
Being aware of the risks associated with mobile
technology is critical. In coming months we will
“What we are seeing with technologies like mobile devices and cloud computing
is that they are enabling business models that simply didn’t exist before….
Giants everywhere are ripe for disruption by new businesses that understand
how to use technology to create a brand new, never-before-possible value
proposition for its customers.” 23
It’s clear that the digital landscape is a treacherous To give you a sense of the pervasiveness of high-
one. Threats can come by attack, by internal error, risk applications, Check Point researchers found
by sabotage. The one thing that poses as an evidence of them in 96 percent of the organizations
especially vulnerable point of entry for businesses studied—a 10-point jump from last year.
is that which is most relied upon for organizational
productivity: applications. The main categories we look at include:
• Remote Admin Tools—applications like
Some applications, like file sharing, are obviously TeamViewer, RDP, and LogMeIn allow remote
risky. But others don’t as quickly come to mind operators to work with your machine and its
because they’re part of what’s come to be known as functions as though physically, in person. A handy
shadow IT—applications that aren’t sponsored or tool for troubleshooting IT problems, it’s also a handy
supported by the central IT organization. Instead, tool that can give hackers a frightening amount of
these technologies and applications are purchased control and power over your network.
and installed outside of IT as required tools to get • File Storage and Sharing—applications like
the job done. DropBox and others allow you to exchange and work
with larger files than you could ordinarily email.
Given others’ reliance on these applications, IT can’t • P2P File Sharing—BitTorrent Protocol and
block usage of them. So, if they are allowed, threat SoulSeek are just two popular examples of what is
prevention needs to be provided. The network must typically used for media exchange like music, videos,
be protected while operating under the assumption or real-time communication.
that these high-risk applications ARE malicious, • Anonymizers—browser plugins or web services
not that they MIGHT be. such as Tor or OpenVPN allow users to interact
92 90
86 86
81 80
77 75
61 62
56
PERCENT OF ORGANIZATIONS
43
REMOTE ADMIN FILE STORAGE AND SHARING P2P FILE SHARING ANONYMIZER
online, anonymously. These can be used legitimately, Check Point found that the use of anonymizers
to minimize risk, but all too often, they are used for increased across the board in every vertical.
malicious purposes.
And while the top three vectors of each major
In 2014, remote admin tools (RATs) led the list of category of high-risk applications remained
the biggest offenders in high-risk applications, with somewhat consistent from last year to this year,
92 percent of organizations studied affected. Of there was more shakeup in the anonymizer category.
all the remote admin tools available, TeamViewer For instance, last year’s top three included Tor,
displaced RDP for first place for attack vectors Ultrasurf, and Hide My Ass. This year: Tor slipped to
in that category, with 78 percent of organizations third place; OpenVPN and Coralcdn were numbers
reporting incidents. one and two. Ultrasurf slid down the list and
Whether breaching for financial gain or hacking to make a point, attackers have several tools at their
disposal to mask their location and identities. And contrary to what Hollywood may portray, tracing and
identifying the criminals is very complex.
Cybercrime investigators admit that they are only catching ‘the bottom of the food chain’ when it comes to
computer crime. That’s because criminal enterprises managed by informed and experienced attackers are
likely to go undetected. Given that they are geographically distributed, well-structured and compartmented,
affiliated hackers only know a small part of the larger organization—further minimizing the exposure to the
criminal organization.
In operating under the radar, cybercriminals employ a host of tools to maintain their anonymity. It starts
with erasing the internet trail back to their source location. The most basic tool for this is a web proxy.
Also called anonymizers, a proxy server acts as an intermediary client computer, redirecting requests
to the ultimately desired destination. In the early days of the internet, web proxies helped conceal a
source’s IP address, but today are more easily countered and traced.
In some cases, hackers use multiple cloaking layers, such as connection to a VPN behind the Tor network,
sourced from a public Wi-Fi, obscuring both the source machine and internet routing locations.
REMOTE ADMIN RDP ∙ LogMeIn ∙ TeamViewer TeamViewer ∙ RDP ∙ LogMeIn TeamViewer ∙ RDP ∙ LogMeIn
2013
ANONYMIZER Tor ∙ Ultrasurf ∙ Hotspot Shield OpenVPN ∙ Coralcdn Ultrasurf ∙ Tor ∙ Hide My Ass
Proxy Suppliers
FILE STORAGE Dropbox ∙ Windows Live Office Dropbox ∙ Windows Live Office Dropbox ∙ Windows Live Office
AND SHARING Hightail Hightail Hightail
REMOTE ADMIN RDP ∙ LogMeIn ∙ TeamViewer RDP ∙ TeamViewer ∙ LogMeIn TeamViewer ∙ RDP ∙ LogMeIn
Hide My Ass was nowhere to be seen. Likely, For instance, the Hola anonymizer app rose from
OpenVPN gained popularity following the Edward three percent to 17 percent. Part of its claim to fame
Snowden revelations about NSA eavesdropping. could be credited to being in the right place at the
The reason is that as an industry standard, right time. Hola emerged from beta testing just
OpenVPN uses crypto technology that cannot before the 2014 Sochi Olympics. Because it allows
be broken if implemented correctly, thus keeping internet access across borders, programming that
communications private. Meanwhile, other would be otherwise only available to people in a
anonymizers have climbed tremendously in specific geography is accessible for those using Hola
popularity, even if not yet one of the top three. to cloak their geolocations.
69
60
51
48
43
24 26
21 20 22
13 12 14 14 16 15 14 14 13
12 11 11 11 11 9
LO DP
N
ER
ES OA IN
RT -
UL T
XU K
IM I
ED SH
O L
IM D E
EV EY
JA UE
(Y OF X
E
)
EV NC
DE E
Y
(Y OF X
SE ICE
SU DE )
IM AR EY
EV NC
UE
LE
GA DIT
EN IT
PO IST
KE
LE
HI BO
O
N
I
EN C
EN U
VN
EI
BU
VE TA
M GO ADM
AG EL
G L
M ND
TA LIV PB
TA LIV PB
R
M FFI
OU FI
SE
EW
RE
EN
M EN
EN
AG SY
AG SY
N
OU F
GM
ON
UP SS
SU EN
OP
LI H
IM R
GH S RO
GH WS DRO
OR
G
VI
DR
S
Y
AM
IL E
IL E
SO
HI OW D
TT
Y
OT T
M
BI
TE
AM
S
W
DO
DO
D
RE
IN
IN
IN
HI
W
63 64
58 59
54 54
49 49
PERCENT OF ORGANIZATIONS
40
35
23 23
19
18
17 17 15 14
12 10 10
8 7
PP OR
S
LA
TR OR
M F
OP SS
RA N
DN
TR OR
M F
OP ASS
N
R
DE UR
ER
CO VP
CO VP
VP
A
HO
HI ASU
T
T
LC
LC
LI
EN
EN
EN
S
Y
Y
A
OP
DE
SU
UL
UL
HI
Y
OX
PR
For file storage and sharing, as well as peer to But the big news in high-risk applications can be
peer (P2P) sharing, the top applications noted last seen in the average number of events per hour and
year were more or less the same. The good news: per day. Check Point researchers studied 4,049,111
fewer occurrences of these in organizations. With events. Organizations experienced 12.7 high-risk
the major media coverage in the past year of leaked application events per hour, 305 times per day.
photos and private emails, no doubt this helped to Compare that to last year’s rate of 162 times per day
make many more aware and precautious. and you have an 88 percent increase.
While malware—both known and unknown—can needed to ensure productivity and innovation. Then,
sometimes seem beyond control, use of high- map out the individuals who should have access to
risk applications at least offers some semblance those programs. Monitor your network to ensure
of regulation. there are no rogue applications present.
3. Encrypt documents to prevent data loss. If a file
Here are four steps you can take to minimize the is forwarded to someone who should not see it,
dangers of these applications: encryption helps block the recipient from seeing
1. Educate your employees. Help people in your or opening the document.
organization understand the risks associated 4. Define and practice category-based application
with specific applications. Don’t assume they control. Help your administrators to help you.
know. Moreover, point them to more secure, IT- Empower them with the ability to block entire
supported tools that can address their business categories of applications as needed. This simplifies
and productivity needs. administration by extending policy control to new
2. Standardize on trusted, enterprise-grade applications as they are adopted.
applications. Identify the specific applications
Breaches aren’t the only way that the bad guys get knowing exactly the right phrasing to elicit a
the job done. Sometimes they need accomplices, response. In fact, some employers have started to
even if they’re unwitting ones. And that’s where social create phishing tests. Because internal error can
engineering and phishing come in. Cybercriminals be a major source of data leakage, companies are
have become so good at knowing the psychology sending spoof phishing emails to employees. If they
around their targets that their emails come across fall for it, it becomes a teachable moment.
as credible for even some who consider themselves
savvy. For instance, an employee gets an email from While the internal issue might not capture as much
someone who claims to be a recruiter and tells the media attention, it’s definitely something that should
individual about an open position. When the person be on the radar of any security-minded business. In
expresses interest, the so-called recruiter asks for 2014, 81 percent of organizations experienced at
more information about the company and possibly least one potential data loss incident. Drilling down,
other sensitive information. In other instances, an organization experiences 1.7 data loss events per
employees receive emails from people posing as hour, 41 times per day—a 41 percent increase over
co-workers and asking for sensitive information, last year.
PROPRIETARY
INFORMATION 41% 35% 24%
BUSINESS DATA
RECORDS 20% 21% 6%
SENSITIVE PERSONAL
INFORMATION 25% 22%
NETWORK
INFORMATION 13% 14%
PASSWORD-
PROTECTED FILES 10% 10% 14%
CONFIDENTIAL
OUTLOOK MESSAGE 5% 5% 7%
BANK ACCOUNT
NUMBERS
5% 4% 3%
Regardless of whether the data is getting out due And it is happening faster than you might imagine.
to external or internal engineering, the appetite for Within 30 minutes of leaving a department store,
that information is fed by one thing: financial gain. your credit card information could be “on sale” on
Cybercrime has not only become profitable; it has the black market.
become a big business. On the other side of the
mirror, the data swiped is not just being sold on the The fresher the theft of the data, the more money
black market, it’s being marketed. Websites post it fetches.
88 86 88 87
82
PERCENT OF ORGANIZATIONS
78 78 79
70
61
50
45
EASY MONEY
Like hunters looking for easy prey, cybercriminals other countries. Chip and PIN is a global standard of
have zeroed in on point of sale (PoS) as their hunting payment that embeds an integrated circuit (IC) chip
ground. The main reason: So many PoS terminals are into the card and can only be authorized when used
running outdated operating systems like Windows with a PIN. As part of this standard, retailers will need
XP, which end up going unpatched and unmanaged. to update their PoS systems to ensure compatibility.
If you were tuned into the media during the past year, But even with chip and PIN, retailers will still
it would have seemed like one major retailer after need to stay one step ahead. Infections like the
another was getting hit with security breaches. “BackOff” malware, which impacted a large number
of U.S. businesses, highlighted a large security
The year started with a bang when Neiman Marcus vulnerability: The malware pre-installed tools in the
was breached and lost 1.1 million account records, supply lines of seven major manufacturers of PoS
only to be outdone that same month by hobby store terminals before being shipped to merchants. Weak
Michaels, which lost three million. As the year or unchanged admin passwords allowed hackers
continued, taxis, beauty stores, Goodwill, UPS, and remote access into devices.
Dairy Queen followed. In September, Home Depot
topped them all with 56 million. All of this adds up The Department of Homeland Security reports that
to 112,250,000 lost records within the United States, more than 1,000 United States businesses were hit
affecting one in three Americans. by PoS malware,27 taking a huge toll on businesses
and individuals. In fact, card replacement cost alone
PoS malware infections certainly occur throughout added up to $1.3 billion. A LexisNexis study called The
the world, but the United States leads the way with True Cost of Fraud 28 says that the average merchant
the most infections, in part because it is not yet on suffered 133 successful fraudulent transactions per
the chip and PIN credit card system being used in month in 2014, up 46 percent from the previous year.
During 2013 and 2014, the retail industry breaches shows that chip and PIN would not
experienced an alarming number of data and have prevented these incidents.
security breaches. These attacks resulted in
the loss of millions of customer credit cards The attackers targeting the retail stores used
and personal information. The companies available remote connections to access store
involved experienced negative financial networks and installed multiple variants
effects from the event, with the largest of malware and software tools to capture
retailer experiencing a 13% drop in its market and export customer data. Shortcomings in
valuation and a reduction in comparable-store store network design and point of sale (PoS)
sales. These breaches impact companies large configuration further enabled the attacks
and small. Between 2013 and 2014, notable by simplifying horizontal movement and
names like Michaels, Neiman Marcus, PF malware infestation.
Chang’s, Target and Home Depot have all
suffered staggering losses from PoS-related To secure against these types of attacks, take
data breaches. a broader view and implement a multi-layered
approach that addresses the entire network—
Customer concerns over privacy and financial not just the parts believed to be most vulnerable.
security are shaken, and corporate boards
are actively looking for structural changes.
The short-term effects are just now coming
to light. The long-term impact will only be
known in the coming years.
Remember that security does not stand still. When it’s encrypted, only individuals who are authorized
you balance your body, there are lots of subtle to view the information will be able to see it.
movements at play that keep you standing. The • Creating layers of protection with checks
same goes with how you need to think through your and balances.
security. To stay ahead of the threats, you need to be • Helping everyone—from top down—understand
constantly assessing and updating as you go. Don’t the importance of mitigating cyber-related risks to
stop with just making sure you’re protected from protect intellectual property.
outside attack; make sure you’re covered internally, • Involving your workforce in improving your
as well. Specifically, we recommend: information security posture by educating them
• Protecting your data by encrypting it—whether it’s on how they can help. Create information security
at rest or in transit. The goal is to provide a cloak policies that employees can understand and
of protection for the data, wherever it goes. When help reinforce.
It’s clear that cybercriminals are not slowing down. and corporate policy—and tie to procedures and
In fact, based on how bad 2014 was, from a cyber requirements, performance measurements, and of
security perspective, analysts expect the security course, people at all levels of the organization.
industry to grow tenfold.
Map out your process and make sure it includes
Threats can come from any direction and it has even the most basic steps, such as applying
become impossible to say that any one organization software patches and updates. Also think about
is safe from attack. In fact, the biggest mistake your ecosystem of partners and how they tie to the
any organization can make is to believe it is security process.
protected, and neglect to revisit its security
infrastructure regularly. When it comes to technology, your security program
must unify multiple layers and controls.
When thinking through your security posture,
take the time to truly understand your threats and Given that threats are coming from multiple places,
vulnerabilities. Look for contributing factors, and single-layer security architectures and multi-vendor
also look at the big picture of where you’re trying point solutions are no longer adequate.
to lead your organization. The most prepared
businesses know that security policy needs to Start with thinking about your architecture as three
stem from strategic goals, business objectives, interconnected levels.
WHAT NEXT?
As mobile devices become, increasingly, primary developers do not scan their apps for vulnerabilities
devices, we expect hackers to look to them as before releasing them.32 Given this reality, and after
their new attack vectors. What’s more, according reviewing what has come from the past year, we
to the Ponemon Institute, 40 percent of mobile app see 2015 as the year to define your mobile security
vendors.php?year=2014
14 Kirk, Jeremy. “An SDN vulnerability forced OpenDaylight to focus on security,” CSO, March 25, 2015.
http://www.csoonline.com/article/2902902/vulnerabilities/an-sdn-vulnerability-forced-opendaylight-
to-focus-on-security.html
15 Reilly, Claire and Musil, Steven. CNET, September 24, 2014.
http://www.cnet.com/news/bigger-than-heartbleed-bash-bug-could-leave-it-systems-shellshocked/
16 Gilbert, David. “What is POODLE? The Latest Online Security Threat After Shellshock and Heartbleed,”
REFERENCES | 60
17 Singh, Anita. “Hay Festival 2012: Salman Rushdie on security and The Satanic Verses,” The Telegraph,
19 Lunden, Ingrid. “Led By iPhone 6, Apple Passed Samsung In Q4 Smartphone Sales, 1.9B Mobiles Sold
21 Taft, Darryl K. “IBM Study Shows Mobile App Developers Neglecting Security,” eWeek, March 21, 2015.
http://www.eweek.com/developer/ibm-study-shows-mobile-app-developers-neglecting-security.html
22 Schroeder, Stan. “Android Malware Spies on You Even After Phone Is Shut Down,” Mashable,
http://teachers.smithsonian.com/science-nature/opening-strange-portals-in-physics-92901090/?all
26 Giovanni, Nikki. Black Feeling, Black Talk, Black Judgment, 1970.
27 United States Computer Emergency Readiness Team. US-CERT, August 27, 2014.
https://www.us-cert.gov/ncas/alerts/TA14-212A
28 LexisNexis. “2014 LexisNexis® True Cost of FraudSM Study.”
http://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2014.pdf
29 Schwartz, Larry. “Joyner Kersee Completes Huge Leap,” ESPN.com.
https://espn.go.com/sportscentury/features/00016055.html
30 Reagan, Ronald. “Address Before a Joint Session of the Tennessee State Legislature in Nashville,”
http://money.cnn.com/2014/07/02/technology/security/russian-hackers/
REFERENCES | 61
32 Vijayan, Jai. “Rush To Release Resulting In Vulnerable Mobile Apps,” Dark Reading, March 20, 2015.
http://www.darkreading.com/attacks-breaches/rush-to-release-resulting-in-vulnerable-mobile-
apps/d/d-id/1319566
33 ABI Research. “Wearable Computing Devices, Like Apple’s iWatch, Will Exceed 485 Million Annual
2014. http://www.techweekeurope.co.uk/e-innovation/internet-of-things-4-9bn-gartner-155298
35 Iger, Bob. Disney Shareholder Meeting, Anaheim, NBC News, March 3, 2006.
http://www.nbcnews.com/id/11767409/ns/business-us_business/t/pixars-star-disney-
shareholders-meeting/#.VSRlovnF9Zt
REFERENCES | 62
We Secure the Future
Worldwide Headquarters
5 Ha’Solelim Street, Tel Aviv 67897, Israel
Tel: 972-3-753-4555 | Fax: 972-3-624-1100
Email: [email protected]
U.S. Headquarters
959 Skyway Road, Suite 300, San Carlos, CA 94070
Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233
www.checkpoint.com